The Latest Password Best Practices from the National Institute of Standards and Technology

204234710_best_practice_400.jpg

Passwords are the first line of defense your accounts have against the myriad of threats out there. It’s imperative that you follow industry best practices when creating them so as to maximize security. Thankfully, the latest guidelines from the National Institute of Standards and Technology, or NIST, make creating secure passwords easy. What is the […]

Tip of the Week: Is Browser-Based Password Management Safe to Use?

423837102_password_management_400.jpg

Passwords are quite literally everywhere nowadays. With so much of modern life now controlled or held within user accounts, keeping your passwords both secure and straight in your head is crucial. Many web browsers now offer some built-in password management utility to help make this process more convenient for the user, but is this option […]

Physical Security Tools Every Business Can Use

283199860_surviellance_security_cameras_400.jpg

Many small and medium-sized businesses don’t consider making physical security investments if they already have some type of workable solution in place. The problem is that there have been a lot of innovative moves made that would make those investments strategically smart at the time. So, while a physical security upgrade may not be a […]

How Big of a Threat is the Dark Web Gig Economy?

215685016_dark_web_400.jpg

Contemporary movies are filled with high-stakes cybercrime, where a lovable criminal syndicate breaks into a company’s systems to help wreak havoc on the true villains of the film, all the while exposing the company’s dirty laundry. Naturally, this idea can be frightening for any business, whether or not they have any dirty laundry to air […]

Don’t Let a Malicious Application Undermine Your Mobile Security

201836699_malicious_app_mobile_400.jpg

While you’ll probably hear us recommend that you update as soon as possible at every opportunity, the source of these updates is important to consider. This is especially the case now that mobile security firm Zimperium has discovered a new mobile spyware that pretends to update your mobile device… but actually steals data and monitors […]

What Can Be Done to Counter COVID-19-Themed Scams?

341874742_covid_19_scams_400.jpeg

As commonly happens with any disaster, COVID-19 has inspired no short supply of scams. While these scams initially focused upon the relief funds that were delivered to people to help sustain the suffering economy, the ongoing vaccine distribution efforts have given those behind these efforts a new means of attack. Let’s consider how these scams […]

Are Utilities as Secure as They Should Be?

248900505_industry_secure_400.jpeg

Recently, a story broke in Florida that sounds like something out of a terse action film: a hacker managed to access a water treatment facility and subjected the Pinellas County water supply with increased levels of sodium hydroxide. While onsite operators were able to correct the issue right away and keep the public safe from […]

Checking a Website’s Safety from Its Google Result

203898730_safe_website_400.jpeg

Google search is synonymous with searching the internet, but that hasn’t stopped them from constantly innovating the service. One of the most recent updates is to give users more context for the content that returns on search results. This works to protect users from potentially clicking on websites that could contain threats. Today, we discuss […]

How Blockchain is Changing Health Technology

280230675_blockchain_400.jpeg

You’d think that the healthcare industry would be at the very cutting-edge when it comes to information technology implementation. That isn’t always the case. One technology that developers are really looking to take advantage of in the healthcare space is blockchain. The technology behind cryptocurrency is being used to help patients better control their care. […]

Why You Need to Do a Security and Compliance Audit

223474600_audit_tech_400.jpg

Businesses that don’t see after their vulnerabilities are just asking to be breached. That’s the consensus view in the IT industry. It’s disconcerting, then, to consider how many businesses don’t actively assess their IT security, especially considering how much these platforms change from year-to-year. Today, we’ll briefly discuss what a security and compliance audit is, […]

You Better Update Your Microsoft Password Today

245723955_reset_password_400.jpg

While we would strongly recommend that you update your passwords more than once a year, now is as good a time as any to do so. Reflecting on this, let’s go over how to fully lock down your Microsoft accounts. We should start with a bit of a warning. In December, a massive cybersecurity attack […]

Hey You… Update Your Google Password, Right Now!

213170870_password_400.jpg

If you haven’t taken the time to go through and update your passwords lately, particularly the one protecting your Google account, you should do so… despite it undeniably being a pain. After all, Google serves various purposes and is attached to many accounts for most. Considering the number of data breaches and other cybersecurity issues […]

How Not to Teach Your Team About Phishing, Courtesy of GoDaddy

290218053_phishing_400.jpg

GoDaddy—the domain registrar and web-hosting company once famed for its risqué advertisements—is facing some significant backlash for a much different reason. On December 14th, GoDaddy’s employees received an email that appeared to be from the company, promising a holiday bonus. However, while the email was from the company as it appeared to be, it was […]

What You Need to Know About the Massive Solarwinds Hack

66905006_alert_breach_400.jpg

2020 has been filled to the brim with adversity and just as we’ve mercifully arrived to the end, the largest and most brazen cyberespionage attack ever has been carried out. Today, we’ll tell you what we know about the attack, what problems it caused, and what we should learn from it going forward.  How Did […]

Watch Out for Malicious Browser Extensions

390064020_malicious_browser_400.jpg

Browser extensions are nifty little programs that can be implemented into your web browser itself, adding onto its capabilities and utility… at least, that’s the concept. Unfortunately, these programs also give cybercriminals a means of secretly launching an attack. The security firm Avast recently identified 28 such third-party extensions that have been installed—according to the […]

What Exactly Is a VPN?

343860455_VPN_400.jpg

One of the major shifts we’ve seen in business in 2020 is the establishment of the remote workforce. Stay-at-home orders brought on by the COVID-19 pandemic made it necessary for businesses to find solutions on how to securely transfer information from what could be unprotected networks. The virtual private network is a solution to this […]

Some Consumers are Aware of Data Privacy, But It’s Not Enough

188488407_data_privacy_400.jpg

With the holidays approaching, and with the global pandemic still underway, online shopping is going to be under even more demand than usual in 2020. With all of these transactions online, it would stand to reason that people would be more keen to follow best security practices than ever before. This week, we take a […]

Have You Applied the Recent Chrome Patches?

223018647_security_update_400.jpg

Being told by an IT provider how important it is for you to update your software is probably a bit like your grade school teacher telling you how important it is to do your homework: of course they’re going to say it, it’s their job to do so. However, we’re telling you what the Department […]

You Even Need To Worry About Phishing In Your Text Messages

182791535_mobile_phishing_400.jpg

As serious as they are, cyberattacks are not always labeled with the most serious-sounding names. We are, of course, talking about phishing: the use of spoofed email addresses and fraudulent messages to get hold of data, or whatever goal the attacker has in mind. One of the silliest-sounding versions of phishing—smishing—has proven to be of […]

Examining Some Unusual Cybercrime Patterns in 2020

263828214_cybercrime_400.jpg

As compared to the past few years, there have been considerably fewer successful data breaches in 2020. While this may sound like exclusively good news, there are a few reasons why this information should be taken with a grain of salt. To begin, let’s examine the data that we currently have available, courtesy of Statista: […]